The Resource Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
Resource Information
The item Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- "These proceedings contain the papers selected for presentation at the 10th European Symposium on Research in Computer Security (ESORICS), held September 12-14, 2005 in Milan, Italy."
- Language
- eng
- Extent
- 1 online resource (xi, 508 pages)
- Contents
-
- Computerized Voting Machines: A View from the Trenches
- XML Access Control with Policy Matching Tree
- Semantic Access Control Model: A Formal Specification
- A Generic XACML Based Declarative Authorization Scheme for Java
- Specification and Validation of Authorisation Constraints Using UML and OCL
- Unified Index for Mobile Object Data and Authorizations
- On Obligations
- A Practical Voter-Verifiable Election Scheme
- Machine-Checked Security Proofs of Cryptographic Signature Schemes
- Sanitizable Signatures
- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts
- Towards a Theory of Intrusion Detection
- On Scalability and Modularisation in the Modelling of Network Security Systems
- Sybil-Resistant DHT Routing
- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
- Quantifying Probabilistic Information Flow in Computational Reactive Systems
- Enforcing Non-safety Security Policies with Program Monitors
- Soundness of Formal Encryption in the Presence of Key-Cycles
- Privacy Preserving Clustering
- Abstractions Preserving Parameter Confidentiality
- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
- Security Notions for Disk Encryption
- Local View Attack on Anonymous Communication
- Browser Model for Security Analysis of Browser-Based Protocols
- Isbn
- 9783540289630
- Label
- Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings
- Title
- Computer security-- ESORICS 2005
- Title remainder
- 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings
- Statement of responsibility
- Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
- Title variation
-
- ESORICS 2005
- 10th European Symposium on Research in Computer Security
- Tenth European Symposium on Research in Computer Security
- European Symposium on Research in Computer Security
- Subject
-
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Informatique
- Ordinateur
- Sécurité informatique
- COMPUTERS -- Internet | Security
- Language
- eng
- Summary
- "These proceedings contain the papers selected for presentation at the 10th European Symposium on Research in Computer Security (ESORICS), held September 12-14, 2005 in Milan, Italy."
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- Language note
- English
- LC call number
- QA76.9.A25
- LC item number
- E98 2005
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2005
- http://bibfra.me/vocab/lite/meetingName
- European Symposium on Research in Computer Security
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- De Capitani di Vimercati, Sabrina
- Syverson, Paul F
- Gollmann, Dieter
- Series statement
- Lecture notes in computer science,
- Series volume
- 3679
- http://library.link/vocab/subjectName
-
- Computer security
- Computers
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Informatique
- Computer security
- Computers
- Sécurité informatique
- Contrôle d'accès
- Ordinateur
- Label
- Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols
- Control code
- 262681007
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 508 pages)
- Form of item
- online
- Isbn
- 9783540289630
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9786611405618
- 10.1007/11555827
- 9783540289630
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-28963-0
- Specific material designation
- remote
- System control number
- (OCoLC)262681007
- Label
- Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols
- Control code
- 262681007
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 508 pages)
- Form of item
- online
- Isbn
- 9783540289630
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9786611405618
- 10.1007/11555827
- 9783540289630
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-28963-0
- Specific material designation
- remote
- System control number
- (OCoLC)262681007
Subject
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Informatique
- Ordinateur
- Sécurité informatique
- COMPUTERS -- Internet | Security
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Computer-security---ESORICS-2005--10th-European/WAepUqM5hZs/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Computer-security---ESORICS-2005--10th-European/WAepUqM5hZs/">Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Computer-security---ESORICS-2005--10th-European/WAepUqM5hZs/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Computer-security---ESORICS-2005--10th-European/WAepUqM5hZs/">Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>